PoC-in-GitHub/2020/CVE-2020-3952.json
2021-09-23 18:14:27 +09:00

122 lines
No EOL
4.3 KiB
JSON

[
{
"id": 255764753,
"name": "CVE-2020-3952",
"full_name": "commandermoon\/CVE-2020-3952",
"owner": {
"login": "commandermoon",
"id": 46551775,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46551775?v=4",
"html_url": "https:\/\/github.com\/commandermoon"
},
"html_url": "https:\/\/github.com\/commandermoon\/CVE-2020-3952",
"description": "Vuln Check",
"fork": false,
"created_at": "2020-04-15T00:51:21Z",
"updated_at": "2020-12-02T09:55:38Z",
"pushed_at": "2020-04-15T22:23:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 256080140,
"name": "CVE-2020-3952",
"full_name": "avboy1337\/CVE-2020-3952",
"owner": {
"login": "avboy1337",
"id": 5463104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
"html_url": "https:\/\/github.com\/avboy1337"
},
"html_url": "https:\/\/github.com\/avboy1337\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"fork": false,
"created_at": "2020-04-16T01:39:33Z",
"updated_at": "2020-12-02T09:55:53Z",
"pushed_at": "2020-04-15T00:13:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 256143992,
"name": "vmware_vcenter_cve_2020_3952",
"full_name": "guardicore\/vmware_vcenter_cve_2020_3952",
"owner": {
"login": "guardicore",
"id": 5675395,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5675395?v=4",
"html_url": "https:\/\/github.com\/guardicore"
},
"html_url": "https:\/\/github.com\/guardicore\/vmware_vcenter_cve_2020_3952",
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2021-09-13T03:33:58Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 59,
"allow_forking": true,
"forks": 59,
"watchers": 250,
"score": 0
},
{
"id": 256499271,
"name": "CVE-2020-3952",
"full_name": "gelim\/CVE-2020-3952",
"owner": {
"login": "gelim",
"id": 179122,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179122?v=4",
"html_url": "https:\/\/github.com\/gelim"
},
"html_url": "https:\/\/github.com\/gelim\/CVE-2020-3952",
"description": "VMWare vmdir missing access control exploit checker",
"fork": false,
"created_at": "2020-04-17T12:39:31Z",
"updated_at": "2020-04-17T17:09:08Z",
"pushed_at": "2020-04-17T17:09:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 257074392,
"name": "vmware_vcenter_cve_2020_3952",
"full_name": "Fa1c0n35\/vmware_vcenter_cve_2020_3952",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/vmware_vcenter_cve_2020_3952",
"description": "Exploit for CVE-2020-3952 in vCenter 6.7 https:\/\/www.guardicore.com\/2020\/04\/pwning-vmware-vcenter-cve-2020-3952\/",
"fork": false,
"created_at": "2020-04-19T18:35:13Z",
"updated_at": "2020-04-19T18:57:16Z",
"pushed_at": "2020-04-19T18:35:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"forks": 2,
"watchers": 1,
"score": 0
}
]